High-risk tools in Mcp Products
4 of the 11 tools in Mcp Products are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
telora_connector_startExecute 3/5Daemon automation: generate configuration and launch the Telora daemon for autonomous agent execution. Creates daemon.json with API credentials and engine settings, then starts ...
-
telora_context_assembleExecute 3/5Assemble layered context for a product, strategy, or delivery. Returns pre-formatted markdown with product philosophy, context documents, strategy goals, delivery details, and i...
-
telora_discoverExecute 4/5Load additional Telora tool domains on demand. At startup only core tools (product, strategy, delivery, issue) are available. Use this to load domains for: agent, role, escalati...
-
telora_product_strategyExecute 3/5Execution roadmap: group deliveries into themed work scopes. Strategies define what the AI daemon works on -- assigning an agent role queues the strategy for autonomous executio...
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Mcp Products
Enforce policy on Mcp Products
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init